F5 Networks BIG-IP : GNU C Library vulnerability (SOL15885)

critical Nessus Plugin ID 79606

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a 'stack extension attack,' a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. (CVE-2011-1071)

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution SOL15885.

See Also

https://support.f5.com/csp/article/K15885

Plugin Details

Severity: Critical

ID: 79606

File Name: f5_bigip_SOL15885.nasl

Version: 1.8

Type: local

Published: 11/28/2014

Updated: 3/10/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/27/2014

Vulnerability Publication Date: 9/10/2007

Reference Information

CVE: CVE-2007-4782, CVE-2010-1917, CVE-2010-2898, CVE-2011-1071

BID: 26403, 41991, 46563

CWE: 94